An Authentication Protocol Without Trusted Third Party

被引:18
|
作者
Shieh, Shiuh-Pyng [1 ]
Yang, Wen-Her [1 ]
Sun, Hun-Min [1 ]
机构
[1] Natl Chiao Tung Univ, Coll Elect Engn & Comp Sci, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
Authentication protocol; ID-based scheme;
D O I
10.1109/4234.585805
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A secure authentication protocol which supports both the privacy of messages and the authenticity of communicating parties is proposed. The trusted third party (key information center) is not needed once the secure network system is set up. Mutual authentication and key distribution can be achieved with two messages merely between two parties involved.
引用
收藏
页码:87 / 89
页数:3
相关论文
共 50 条
  • [1] Data Anonymous Collection Protocol without Trusted Third Party
    Zhou Zhiping
    Li Zhicong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1442 - 1449
  • [2] AN OWNERSHIP SHARING PROTOCOL FOR RFID WITHOUT A TRUSTED THIRD PARTY
    Kapoor, Gaurav
    Piramuthu, Selwyn
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 28 - 30
  • [3] Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
    Choi, JG
    Sakurai, K
    Park, JH
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 265 - 279
  • [4] Edge based authentication protocol for vehicular communications without trusted party communication
    Dharminder, Dharminder
    Kumar, Uddeshaya
    Gupta, Pratik
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119
  • [5] Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party
    Harn, Lein
    Hsu, Ching-Fang
    Li, Bohan
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (05): : 1132 - 1140
  • [6] Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party
    Lein Harn
    Ching-Fang Hsu
    Bohan Li
    [J]. Mobile Networks and Applications, 2018, 23 : 1132 - 1140
  • [7] Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things
    Trivedi, Hiral S.
    Patel, Sankita J.
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 812 - 818
  • [8] Secure pervasive computing without a Trusted Third Party
    Pirzada, AA
    McDonald, C
    [J]. IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
  • [9] Scalable threshold scheme without a trusted third party
    Li, B
    Zhang, SS
    Chen, KF
    [J]. PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 853 - 858
  • [10] Pseudonymous smart metering without a trusted third party
    Finster, Soeren
    Baumgart, Ingmar
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1723 - 1728